{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:19Z","timestamp":1725882739556},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_6","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:29:21Z","timestamp":1489710561000},"page":"46-49","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Xiaofeng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Guangyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongji","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xiaolei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1109\/SURV.2011.020211.00035","volume":"13","author":"M Erol-Kantarci","year":"2011","unstructured":"Erol-Kantarci, M., Mouftah, H.T., Oktug, S.: A survey of architectures and localization techniques for underwater acoustic sensor networks. Commun. Surv. Tutorials IEEE 13(3), 487\u2013502 (2011)","journal-title":"Commun. Surv. Tutorials IEEE"},{"issue":"14\u201315","key":"6_CR2","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1016\/j.oceaneng.2011.07.017","volume":"38","author":"H Tan","year":"2011","unstructured":"Tan, H., Diamant, R., Seah, W.K.G., Waldmeyer, M.: A survey of techniques and challenges in underwater localization. Ocean Eng. 38(14\u201315), 1663\u20131676 (2011)","journal-title":"Ocean Eng."},{"issue":"11","key":"6_CR3","doi-asserted-by":"crossref","first-page":"5860","DOI":"10.1109\/TSP.2010.2066972","volume":"58","author":"T Xing","year":"2010","unstructured":"Xing, T., Jian, L.: Cooperative positioning in underwater sensor networks. IEEE Trans. Signal Process. 58(11), 5860\u20135871 (2010)","journal-title":"IEEE Trans. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Alfao, J.G., Barbeau, M., Kranakis, E.: Secure localization of nodes in wireless sensor networks with limited number of truth tellers. In: Proceedings of 7th Annual Communication Networks and Services Research Conference, pp. 86\u201393 (2009)","key":"6_CR4","DOI":"10.1109\/CNSR.2009.23"},{"doi-asserted-by":"crossref","unstructured":"Chen, H., Lou, W., Wang, Z.: Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In: Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing, pp. 296\u2013309 (2009)","key":"6_CR5","DOI":"10.1007\/978-3-642-02830-4_23"},{"key":"6_CR6","volume-title":"Applied Interval Analysis, with Examples in Parameter and State Estimation, Robust Control and Robotics","author":"L Jaulin","year":"2001","unstructured":"Jaulin, L., Kieffer, M., Didrit, O., Walter, E.: Applied Interval Analysis, with Examples in Parameter and State Estimation, Robust Control and Robotics. Springer, London (2001)"},{"issue":"23","key":"6_CR7","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1049\/el.2014.2086","volume":"50","author":"G Cheng","year":"2014","unstructured":"Cheng, G., Chen, H.: Game model for switch migrations in software-defined network. Electron. Lett. 50(23), 1699\u20131700 (2014)","journal-title":"Electron. Lett."},{"doi-asserted-by":"crossref","unstructured":"Ning, G., Yang, D., Tie, L., Cai, K.-Y.: Nash equilibrium of time-delay interaction complex networks subject to persistent disturbances. IET Control Theory and Applications (2012)","key":"6_CR8","DOI":"10.1049\/iet-cta.2011.0346"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T17:34:16Z","timestamp":1568914456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_6","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}